Home
last modified time | relevance | path

Searched refs:encryption (Results 1 – 25 of 67) sorted by relevance

123

/openbsd/usr.bin/ssh/
H A DPROTOCOL.chacha20poly13052 encryption cipher supported by OpenSSH.
17 authenticated encryption mode. The construction used is based on that
19 data passed to the MAC and in the addition of encryption of the packet
25 The chacha20-poly1305@openssh.com offers both encryption and
60 for encryption of the packet payload.
87 ChaCha20 must never reuse a {key, nonce} for encryption nor may it be
H A DOVERVIEW35 - Ssh contains several encryption algorithms. These are all
48 RSA key generation, encryption, decryption
69 encryption routines.
139 negotiate encryption, then perform authentication, preparatory
H A DPROTOCOL.key65 5. No encryption
/openbsd/sys/dev/pci/drm/amd/display/modules/hdcp/
H A Dhdcp1_transition.c81 } else if (!conn->is_repeater && input->encryption != PASS) { in mod_hdcp_hdcp1_transition()
131 input->encryption != PASS) { in mod_hdcp_hdcp1_transition()
229 } else if ((!conn->is_repeater && input->encryption != PASS) || in mod_hdcp_hdcp1_dp_transition()
308 } else if (input->encryption != PASS || in mod_hdcp_hdcp1_dp_transition()
H A Dhdcp1_execution.c236 &input->encryption, &status, in computations_validate_rx_test_for_repeater()
241 &input->encryption, &status, in computations_validate_rx_test_for_repeater()
362 if (input->encryption != PASS) in read_ksv_list()
364 &input->encryption, &status, in read_ksv_list()
H A Dhdcp.h51 uint8_t encryption; member
/openbsd/gnu/usr.bin/cvs/
H A Dconfigure.in334 dnl Use --with-encryption to turn on encryption support
336 AC_ARG_ENABLE(encryption, optenable
337 [ --enable-encryption enable encryption support],
339 yes) encryption=true ;;
340 no) encryption=false ;;
341 *) AC_MSG_ERROR(bad value ${enableval} for encryption option) ;;
343 [encryption=false])
344 if test "$encryption" = "true"; then
H A Dcvs.spec.in57 control system with Kerberos authentication and encryption.
69 %configure --with-gssapi=/usr/kerberos --enable-encryption
149 - build with gssapi auth (--with-gssapi, --with-encryption)
H A Dcvs.spec57 control system with Kerberos authentication and encryption.
69 %configure --with-gssapi=/usr/kerberos --enable-encryption
H A Dconfigure4233 yes) encryption=true ;;
4234 no) encryption=false ;;
4238 encryption=false
4241 if test "$encryption" = "true"; then
H A Dconfig.h.in90 /* Define if you want encryption support. */
/openbsd/sbin/isakmpd/
H A DQUESTIONS24 Main mode when using public key encryption authentication does not look
29 'Subsequent messages MUST use the last CBC encryption block from the previous
H A DTO-DO53 * RSA encryption authentication.
112 * El-Gamal public key encryption.
H A Dipsec_num.cst121 # IKE encryption algorithm.
/openbsd/regress/sbin/ipsecctl/
H A Dsafail1.ok2 stdin: 6: no encryption or authentication with ipcomp
/openbsd/regress/usr.bin/openssl/
H A DREADME1 testenc.sh tests encryption routines
/openbsd/lib/libcrypto/asn1/
H A Dp5_pbev2.c79 .offset = offsetof(PBE2PARAM, encryption),
208 scheme = pbe2->encryption; in PKCS5_pbe2_set()
/openbsd/lib/libcrypto/rc2/
H A Drrc2.doc47 *encryption* algorithm, and a *decryption* algorithm.
123 The decryption operation is simply the inverse of the encryption operation.
214 A non-US based programmer who has never seen any encryption code before will
216 knowledge of any other encryption algorithms. Stand by.
/openbsd/lib/libssl/doc/
H A Dopenssl.txt319 can be used for SGC ("step up" encryption) otherwise anyone could use it.
984 The parameters nid_key and nid_cert are the key and certificate encryption
985 algorithms, iter is the encryption iteration count, mac_iter is the MAC
1034 with lower encryption. Yes it's the dreaded crypto laws at work again which
1035 allow strong encryption on private keys and only weak encryption on other
1207 password" the encryption password is called the "privacy password" in the
1221 encryption is the same then there is no point in having a high iteration
1222 count for encryption if the MAC has no count. The MAC could be attacked
1226 This is the NID of the password based encryption method used. The following are
1237 algorithms. Typically you may be able to use any encryption on shrouded key
[all …]
/openbsd/lib/libcrypto/evp/
H A Devp_pbe.c449 cipher = EVP_get_cipherbyobj(pbe2->encryption->algorithm); in PKCS5_v2_PBE_keyivgen()
458 if (EVP_CIPHER_asn1_to_param(ctx, pbe2->encryption->parameter) < 0) { in PKCS5_v2_PBE_keyivgen()
/openbsd/sys/conf/
H A DGENERIC28 option UVM_SWAP_ENCRYPT# support encryption of pages going to swap
/openbsd/lib/libcrypto/x509/
H A Dx509_local.h394 X509_ALGOR *encryption; member
/openbsd/lib/libssl/test/
H A Dtimes5 They give an indication of the SSL protocol and encryption overheads.
/openbsd/etc/
H A Dprotocols105 any 99 any # private encryption scheme
/openbsd/gnu/usr.bin/perl/pod/
H A Dperlfilter.pod207 how strong your encryption algorithm is, anyone determined enough can
269 decoding. (Rot13 is a very simple encryption scheme used in Usenet
560 The only stable usage for source filters are encryption, compression,

123